1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
guajiro [1.7K]
3 years ago
15

1

Computers and Technology
1 answer:
irakobra [83]3 years ago
3 0

Answer

A constant 20 percent underinflated condition will reduce the life of a tire by 30 percent, and 40 percent underinflation will reduce tire life by 50 percent. Underinflation will increase flexing and heat buildup within the tire components which deteriorate tires and reduces casing life and retreadability.

You might be interested in
If a web page visitor clears the analytics cookie from their browser, what will occur?
katrin2010 [14]

Answer:

If a web page visitor clears the Analytics cookie from their browser, Analytics will not be able to associate user behavior data with past data collected. ... It will set a new browser cookie the next time a browser loads a tracked page.

6 0
3 years ago
How do i add an answer on brainly i click to add an answer and it sends me to the home page
cricket20 [7]

Answer:  try to just add as little as possible then add the answser or just reload your browser

Explanation:

7 0
3 years ago
How do network intrusion detection systems (NIDS) and host-based intrusion detection systems (HIDS) differ?an NIDS focuses more
balandron [24]

Answer:

a. NIDS focuses more on analyzing incoming traffic, while an HIDS monitors valuable OS files

Explanation:

Intrusion detection system is used in analyzing, detecting, and raising alarm on suspicious network activities used by hackers to access unauthorized sites. Network intrusion detection system is meant to work in real-time, so as to analyze incoming traffic. Packets moving across the network are evaluated for threats.

Host intrusion detection system work within the operating system of the device to evaluate the history of system files that could contain threats, or unusual file permission changes, and then raise an alarm.

3 0
3 years ago
1. What kind of metrics would be useful that are based on testing knowledge after security awareness training? The metrics could
DedPeter [7]

Answer:

i hope it will helpful for your

mark me brainlist

Explanation:

Metrics refer to a system or standards of measurement.

These are measures of quantitative assessment for the purpose of comparing, tracking and performance measurement.

When it comes to measuring employee's awareness, people's knowledge of comprehensive security awareness it can be monitored through online security awareness programs. The knowledge of the employees can be tested in regard of a hot topic i.e cybersecurity practices.

Online quizes can be used to show whether employees know the risks of leaving a computer unmonitored.

Simulated or planned cyber attacks, mockdrills can be planned by the company to test the presence of mind, readiness of employees after the training.

These things should be done without any prior notice so that the employees feel the real pressure and the situation is same as the real world

The metrics used to test the security awareness of the trained staff must be consistent, cheap to gather, can be expressed as cardinal or in percentage , and most importantly they should be contextually relevant i.e they should faciliate decision makers to take actions and attain the desired objective.

Awareness surveys are important baseline to test the knowledge of employees after the training. They are simple to set up and easy to use as well.

For example- all employees know that there is a security team but do they know their goals and policies of the team. Awareness surveys can be used to check these parameters and get the desired results from it.

6 0
3 years ago
Read three numbers from user input. Then, print the product of those numbers. Ex: If input is 2 3 5, output is 30. Note: Our sys
Murrr4er [49]

Answer:

This is written in Python 3. And I am assuming that since the output is "30", which is derived from the inputs 2, 3, and 5, these three are multiplied to get the final output.

<em>fnum = int(input('Enter first number: '))</em>

<em>snum = int(input('Enter second number: '))</em>

<em>tnum = int(input('Enter third number: '))</em>

<em />

<em>output = (fnum * snum) * tnum</em>

<em>print ("The output is:", output)</em>

Explanation:

For the first three lines, we ask the user to input 3 numbers. At the same time, we are also converting these inputs into int type.  

  • fnum = int(input('Enter first number: '))
  • snum = int(input('Enter second number: '))
  • tnum = int(input('Enter third number: '))

The breakdown here is as follows:

  • fnum, snum, and tnum are user-defined variables which will hold the user's inputs.
  • int() is needed to define that everything inside it is an integer. If we don't first convert the input to integers, we will receive an error during multiplication saying that we cannot multiply non-int type variables. You can also choose to use Float here instead of Int - in which case, it will be float().
  • input('Enter first number:' )) - this is the part where we ask the user to enter the number they want.

Put together, it looks like this:

<em>variable = int(input('Your Custom Text Here: '))</em>

<em />

The next block would be:

  • output = (fnum * snum) * tnum

This is where we multiply the first, second, and third number to get to the output.

Finally, we print it with:

  • print ("The output is:", output)

Concatenating a string and variable looks like this.

print("text here", output) - when concatenating a string and a variable, simply add a comma after the quotation marks of the string.

8 0
3 years ago
Other questions:
  • Which of these words could byte pair encoding compress the most?
    13·1 answer
  • List the 4 Fundamental Storage Technologies​
    10·2 answers
  • Many professional photographers take pictures of people. What skills would someone have to have to be successful in these types
    13·1 answer
  • Consider the classes below:
    13·1 answer
  • System A has two processors. Program X takes 50 seconds to execute on one of the processors. Program Y takes 50 seconds to execu
    8·1 answer
  • What are the other way of getting website static​
    14·2 answers
  • Assume you are part of the systems development team at a medium-sized organization. The database will enable sales reps to have
    8·1 answer
  • Among us Question. Worth 15 Points.<br> Which Vents do the Admin Vents Connect?
    14·2 answers
  • Based on Microsoft's Component Object Model (COM), _____ is database middleware that adds object-oriented functionality for acce
    11·1 answer
  • oe, a user, receives an email from a popular video streaming website. the email urges him to renew his membership. the message a
    9·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!